Smart contract-enabled secure sharing of health data for a mobile cloud-based e-health system

P Chinnasamy, A Albakri, M Khan, AA Raja, A Kiran… - Applied Sciences, 2023 - mdpi.com
Healthcare comprises the largest revenue and data boom markets. Sharing knowledge
about healthcare is crucial for research that can help healthcare providers and patients …

A literature review on access control in networking employing blockchain

PADSN Wijesekara - The Indonesian Journal of Computer Science, 2024 - ijcs.net
Access Control (AC) in networking attempts to make sure that only authorized devices
perform actions formed upon privileges defined for them with a view to prevent malicious …

An adaptive privacy protection framework for user energy data using dictionary learning and watermarking techniques

H Chen, W Guo, K Sun, X Wang, S Wang, L Guo - Applied Energy, 2024 - Elsevier
With the rise of user energy consumption data as a significant data asset, data privacy has
emerged as a critical concern. To address users' diverse attitudes towards data sharing and …

IoT based smart gardening for smart cities using blockchain technology

TS RajaRajeswari, P Chinnasamy… - 2022 international …, 2022 - ieeexplore.ieee.org
The automation of agriculture is growing and thrust areas in a technological world.
Previously, the data's are monitored in simple LCD screen, but in our article, we are …

A derivative matrix-based covert communication method in blockchain

X Zhang, X Zhang, X Zhang, W Sun… - … Systems Science and …, 2023 - dr.ntu.edu.sg
The data in the blockchain cannot be tampered with and the users are anonymous, which
enables the blockchain to be a natural carrier for covert communication. However, the …

Zero trust access authorization and control of network boundary based on cloud sea big data fuzzy clustering

L Zhao, M Sun, B Yang, J Xie… - Journal of Intelligent & …, 2022 - content.iospress.com
With the digital transformation of enterprises, the traditional security defense technology has
been unable to meet the security requirements of enterprises, and the data security and …

A review of blockchain technology in smart applications: Research issues and open challenges

B Samuel, K Kasturi - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
The increasing urbanization of the worldwide people has a significant impact on societal
attitudes, particularly life expectancy, as a consequence of a variety of macroeconomic …

A Blockchain‐Based Verifiable User Data Access Control Policy for Secured Cloud Data Storage

X Li - Computational Intelligence and Neuroscience, 2022 - Wiley Online Library
Adding the adequate level of security of information systems dealing with sensitive data,
privacy, or defense systems involves some form of access control. The audits performed are …

An optimized deep learning model to ensure data integrity and security in IoT based e-commerce block chain application

M Navaneethan, S Janakiraman - Journal of Intelligent & …, 2023 - content.iospress.com
E-commerce, often known as electronic commerce, is the purchasing and selling of goods
over the internet using electronic devices to share data. Banks and other financial …

BookChain: A Secure Library Book Storing and Sharing in Academic Institutions using Blockchain Technology

P Chinnasamy, A Elumalai… - 2023 International …, 2023 - ieeexplore.ieee.org
By exploiting wireless operators, contemporary bookcrossing allows people to share books
conveniently and hastens the spread of knowledge. Nevertheless, the widespread use of …